Analysis
-
max time kernel
4294210s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
19-03-2022 15:43
Static task
static1
Behavioral task
behavioral1
Sample
f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2.exe
Resource
win7-20220311-en
General
-
Target
f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2.exe
-
Size
234KB
-
MD5
32990c51bb03c767c66472ea067e6d0c
-
SHA1
cc1f2bc671013ca140189b2314f71bdf35af2167
-
SHA256
f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2
-
SHA512
2f7552269dcd22ab9401d77e4d6679e71814e138662b80838b913844345e390d79864929d9037f8d206643d7c82698dd6d964e96312b291c7a368e3007c67d12
Malware Config
Extracted
systembc
dec15coma.com:4039
dec15coma.xyz:4039
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jtdorax.exepid process 680 jtdorax.exe -
Processes:
resource yara_rule C:\ProgramData\orfrsj\jtdorax.exe upx C:\ProgramData\orfrsj\jtdorax.exe upx -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org 5 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2.exedescription ioc process File created C:\Windows\Tasks\jtdorax.job f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2.exe File opened for modification C:\Windows\Tasks\jtdorax.job f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2.exepid process 1460 f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1636 wrote to memory of 680 1636 taskeng.exe jtdorax.exe PID 1636 wrote to memory of 680 1636 taskeng.exe jtdorax.exe PID 1636 wrote to memory of 680 1636 taskeng.exe jtdorax.exe PID 1636 wrote to memory of 680 1636 taskeng.exe jtdorax.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2.exe"C:\Users\Admin\AppData\Local\Temp\f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
C:\Windows\system32\taskeng.exetaskeng.exe {8BE72859-8E3C-44EF-9012-2EB6BA2EC885} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\ProgramData\orfrsj\jtdorax.exeC:\ProgramData\orfrsj\jtdorax.exe start2⤵
- Executes dropped EXE
PID:680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
32990c51bb03c767c66472ea067e6d0c
SHA1cc1f2bc671013ca140189b2314f71bdf35af2167
SHA256f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2
SHA5122f7552269dcd22ab9401d77e4d6679e71814e138662b80838b913844345e390d79864929d9037f8d206643d7c82698dd6d964e96312b291c7a368e3007c67d12
-
MD5
32990c51bb03c767c66472ea067e6d0c
SHA1cc1f2bc671013ca140189b2314f71bdf35af2167
SHA256f4bcf65872fdee88023c7b005e860dee157c549ee1db7e67a160091b713788f2
SHA5122f7552269dcd22ab9401d77e4d6679e71814e138662b80838b913844345e390d79864929d9037f8d206643d7c82698dd6d964e96312b291c7a368e3007c67d12